Sie sind auf Seite 1von 6

2

1. When a collision occurs in a • workstations A, B, C, and the 12. to secure the console port with
network using CSMA/CD, how do interfaces of the router the password “cisco” to deny
hosts with data to transmit respond • workstations B, C, D, E, F, and access to the console port by
after the backoff period has interfaces of the router specifying 0 lines are available to
expired? gain access to line configuration
6. Refer to the exhibit. How many mode by supplying the required
collision domains are depicted in password to configure the privilege
• #The hosts return to a listen-
the network? exec password that will be used for
before-transmit mode.
•1 remote access problem?
• The hosts creating the collision
• #2 • incorrect vty lines configured
have priority to send data.
•4 • incompatible Secure Shell version
• The hosts creating the collision
•6 • incorrect default gateway address
retransmit the last 16 frames.
•7 • #vty lines that are configured to
• The hosts extend their delay
•8 allow only Telnet
period to allow for rapid
transmission.
7. Which two statements about 13. Which two statements are true
Layer 2 Ethernet switches are true? about EXEC mode passwords?
2. Refer to the exhibit. The switch
(Choose two.) (Choose two.)
and workstation are administratively
• Layer 2 switches prevent • The enable secret password
configured for full-duplex operation.
broadcasts. command stores the configured
Which statement accurately reflects
• #Layer 2 switches have multiple password in plain text.
the operation of this link?
collision domains. • #The enable secret password
• #No collisions will occur on this
• Layer 2 switches route traffic command provides better security
link.
between different networks. than the enable password.
• Only one of the devices can
• Layer 2 switches decrease the • #The enable password and
transmit at a time.
number of broadcast domains. enable secret password protect
• The switch will have priority for
• #Layer 2 switches can send traffic access to privileged EXEC mode.
transmitting data.
based on the destination MAC • The service password-encryption
• The devices will default back to
address. command is required to encrypt the
half duplex if excessive collisions
enable secret password. Best
occur.
8. Which command line interface practices require both the enable
(CLI) mode allows users to password and enable secret
3. Refer to the exhibit. What action
configure switch parameters, such password to be configured and
does SW1 take on a frame sent
as the hostname and password? used simultaneously.
from PC_A to PC_C if the MAC
• user EXEC mode
address table of SW1 is empty?
• privileged EXEC mode 14. Refer to the exhibit. The exhibit
• SW1 drops the frame.
• #global configuration mode shows partial output of the show
• #SW1 floods the frame on all
• interface configuration mode running-config command. The
ports on SW1, except port Fa0/1.
enable password on this switch is
• SW1 floods the frame on all ports
9. A network administrator uses the “cisco.” What can be determined
on the switch, except Fa0/23 and
CLI to enter a command that from the output shown?
Fa0/1.
requires several parameters. The • The enable password is encrypted
• SW1 uses the CDP protocol to
switch responds with “% Incomplete by default.
synchronize the MAC tables on
command”. The administrator • An MD5 hashing algorithm was
both switches and then forwards
cannot remember the missing used on all encrypted passwords.
the frame to all ports on SW2.
parameters. What can the • #Any configured line mode
administrator do to get the passwords will be encrypted in this
4. When a switch receives a frame
parameter information? append ? configuration.
and the source MAC address is not
• to the last parameter • This line represents most secure
found in the switching table, what
• #append a space and then ? to privileged EXEC mode password
action will be taken by the switch to
the last parameter possible.
process the incoming frame?
• use Ctrl-P to show a parameter
• The switch will request that the
list. 15. Which statement is true about
sending node resend the frame.
• use the Tab key to show which the command banner login
• The switch will issue an ARP
options are available “Authorized personnel Only” issued
request to confirm that the source
on a switch?
exists.
10. Where is the startup • The command is entered in
• #The switch will map the source
configuration stored? privileged EXEC mode.
MAC address to the port on which it
• DRAM • #The command will cause the
was received.
• #NVRAM message Authorized personnel
• The switch ends an
• ROM Only to display before a user logs
acknowledgement frame to the
• startup-config.text in.
source MAC of this incoming frame.
• The command will generate the
11. If a network administrator error message % Ambiguous
5. Refer to the exhibit. The switch
enters these commands in global command: “banner motd” ” to be
and the hub have default
configuration mode on a switch, displayed.
configurations, and the switch has
what will be the result? • The command will cause the
built its CAM table. Which of the
• #Switch1(config-line)# line message End with the character
hosts will capture a copy of the
console 0 “%” to be displayed after the
frame when workstation A sends a
• Switch1(config-line)# password command is entered into the
unicast packet to workstation C?
cisco switch.
• #workstation C
• Switch1(config-line)# login
• workstations B and C
16. What are two ways to make a
switch less vulnerable to attacks number is reached. PC1 experiences a delay when
like MAC address flooding, CDP accessing applications on the
attacks, and Telnet attacks? 19. Refer to the exhibit. What server. What two statements about
(Choose two.) happens when Host 1 attempts to latency are true? (Choose two.)
• Enable CDP on the switch. send data? • Each hop in the path adds delay
• #Change passwords regularly. • #Frames from Host 1 cause the to the overall latency.
• #Turn off unnecessary services. interface to shut down. • #Placing the bits on the wire at
• Enable the HTTP server on the • Frames from Host 1 are dropped PC1 is propagation delay.
switch. and no log message is sent. • Total latency depends solely on
• Use the enable password rather • Frames from Host 1 create a MAC the number of devices in the path.
than the enable secret password. address entry in the running-config. • #The NIC delay at points A and F
• Frames from Host 1 will remove contributes to the overall latency.
17. Which two statements are true all MAC address entries in the • The time it takes for an electrical
regarding switch port security? address table. signal to transit the segment from
(Choose two.) point C to point D is the cause for
• The three configurable violation 20. What happens when the the propagation delay.
modes all log violations via SNMP. transport input ssh command is • Because optimized routing
• #Dynamically learned secure entered on the switch vty lines? algorithms are faster than switching
MAC addresses are lost when the • The SSH client on the switch is algorithms, routers R1 and R2 are
switch reboots. enabled. expected to add less latency than
• The three configurable violation • #Communication between the switches SW1 and SW2.
modes all require user intervention switch and remote users is
to re-enable ports. encrypted. 22. Refer to the exhibit. Which
• After entering the sticky • A username/password hosts will receive a broadcast frame
parameter, only MAC addresses combination is no longer needed to sent from Host A?
subsequently learned are converted establish a secure remote • hosts A and B
to secure MAC addresses. connection to the switch. • #hosts D and E
• #If fewer than the maximum • The switch requires remote • hosts A, B, and C
number of MAC addresses for a connections via proprietary client • #hosts A, B, C, D, and E
port are configured statically, software. • hosts A, B, C, D, E, and F
dynamically learned addresses are
added to CAM until the maximum 21. Refer to the exhibit. A user on

3
1. Refer to the exhibit. The network Switch(config-if)# ip default- allowed across the trunk.
administrator needs to setup gateway 10.1.10.254 • The switches will negotiate via
Switch1 for remote access from VTP which VLANs to allow across
HostA. Theshow ip interface brief is 2. Refer to the exhibit. On the basis the trunk.
issued on Router1 and the show of the configuration shown, how will
interfaces trunk command is issued an Ethernet frame on port 4. Which parameter is used to
on theSwitch1 to verify the current GigabitEthernet0/1 be modified? uniquely identify one wireless
status. The administrator applies • 802.1Q encapsulation prepends a network from another?
the additional configuration shown 4-byte tag field in front of the • #SSID
in theexhibit to Switch1. However, original Ethernet frame and • OFDM
the telnet from HostA fails. What recomputes the frame check • WEP
additional commands need to be sequence (FCS) on the modified • DSSS
appliedto the switch? frame.
• Switch(config)# interface vlan 1 • #802.1Q encapsulation inserts a 5. Refer to the exhibit. What is the
Switch(config-if)# ip address 4-byte tag field into the original consequence if SW1 port F0/1 is
10.1.1.250 255.255.255.0 Ethernet frame between the source configured as an edge port?
Switch(config-if)# no shutdown address and type/length fields and • SW1 port F0/1 transitions to the
Switch(config-if)# ip default- recomputes the frame check learning state.
gateway 10.1.10.254 sequence (FCS) on the modified • #SW1 port F0/1 can generate a
• Switch(config)# interface vlan 1 frame. temporary loop.
Switch(config-if)# ip address • 802.1Q encapsulation prepends • SW1 port F0/1 becomes a non-
10.1.50.250 255.255.255.0 an 802.1p field in front of the designated port.
Switch(config-if)# no shutdown original Ethernet frame and • SW1 port F0/2 no longer passes
Switch(config-if)# ip default- recomputes the frame check BPDUs to SW4.
gateway 10.1.50.254 sequence (FCS) on the modified
• Switch(config)# interface vlan 10 frame. • 802.1Q encapsulation 6. Refer to the exhibit. What will
Switch(config-if)# ip address inserts an 802.1p field into the allow a host on VLAN 40 on switch
10.1.10.250 255.255.255.0 original Ethernet frame between the X to communicate with a host in
Switch(config-if)# no shutdown source address and type/length VLAN 40 on switch Y?
Switch(config-if)# ip default- fields and recomputes the frame • QoS
gateway 10.1.10.254 check sequence (FCS) on the • routing
• #Switch(config)# interface vlan 10 modified frame. • #trunking
Switch(config-if)# ip address • VPN
10.1.1.250 255.255.255.0 3. What VLANs are allowed across
Switch(config-if)# no shutdown a trunk when the range of allowed 7. Refer to the exhibit. Spanning-
Switch(config-if)# ip default- VLANs is set to the default value? tree port priorities are 128 for all
gateway 10.1.10.254 • #All VLANs will be allowed across interfaces. The network
• Switch(config)# interface vlan 50 the trunk. administrator enters the spanning-
Switch(config-if)# ip address • Only VLAN 1 will be allowed tree vlan 1 root primary command
10.1.10.250 255.255.255.0 across the trunk. on S4. Which two port results are
Switch(config-if)# no shutdown • Only the native VLAN will be correct? (Choose two.)
• #S1 Gi0/1 becomes a root port. to connect SW1 and SW2. these switches? (Choose two.)
• S2 Gi0/2 becomes a non- • A new VLAN can be added to
designated port. 12. What happens when the crypto Switch1 and that information will be
• S3 Gi0/1 becomes a non- key zeroize rsa command is added only to Switch2.
designated port. entered on a switch configured with • #A new VLAN can be added to
• S4 Gi0/1 becomes a root port. the transport input ssh command Switch1 and that information will be
• #S4 Gi0/2 becomes a designated on the vty lines? added to Switch2 and Switch4.
port. • A new RSA key pair is created. • #An existing VLAN can be deleted
• The switch defaults to allowing from Switch4 and that VLAN will be
8. Refer to the exhibit. Which two Telnet connections only. deleted from Switch1 and Switch2.
facts can be confirmed by this • The switch is no longer able to • An existing VLAN can be deleted
output? (Choose two.) make SSH connections as an SSH from Switch2 and that VLAN will be
• This switch shows no client. deleted from Switch1 and Switch4.
configuration revision errors. • #The switch allows remote • A new VLAN can be added to
• This switch has established two- connections only after a new RSA Switch4 and that information will be
way communication with the key pair is generated. added to Switch1, Switch2, and
neighboring devices. Switch3.
• #This switch is configured to 13. Refer to the exhibit. An Ethernet • A new VLAN can be added to
advertise its VLAN configuration to switch has developed the CAM Switch3 and that information will be
other VTP-enabled switches in the table shown. What action will the added to Switch1, Switch2, and
same VTP domain. switch take when it receives the Switch4.
• This switch will drop all VTP frame shown at the bottom of the
advertisements that come from the exhibit? 18. Refer to the exhibit. Computer
switches that are configured in the • #forward the frame out all A sends a broadcast message.
same VTP domain. interfaces except Interface3 Which devices will see the
• #This switch will cause no • add station 00-00-3D-1F-11-05 to broadcast?
disruption in the VTP domain Interface2 in the forwarding table • computer B
operations if the rest of the • forward the frame out Interface3 • computer B and Router1
switches in the same VTP domain • discard the frame • #computer C and Router1
have a higher configuration revision • forward the frame out all • computer B, computer D,
number. interfaces computer E and Router1
• forward the frame out Interface2 • computer B, computer C,
9. Refer to the exhibit. R1 is computer D, computer E and
configured for traditional inter-VLAN 14. Which two statements describe Router1
routing. R1 can ping computer 3 but Spanning Tree Protocol? (Choose • computer A, computer B,
cannot ping computer 1. What is a two.) computer C, computer D, computer
possible cause for this failure? • #It eliminates Layer 2 loops in E and Router1
• #S1 port Fa0/11 is in the wrong network topologies.
VLAN. • It eliminates the need for 19. Refer to the exhibit. The
• R1 does not have an active redundant physical paths in network administrator enters the
routing protocol. network topologies. configuration shown to allow both
• The IP address of computer 1 is in • #It can only be used in networks SSH and Telnet connections to the
the wrong logical network. in which Layer 2 switching is in use. switch. The Telnet connections fail.
• Router interface Fa0/0 has the • It can only be used in networks What is the most likely cause of this
wrong trunk encapsulation type where both routers and switches problem?
configured. are used together. • The SSH version number is
• It can only be used in networks wrong.
10. Refer to the exhibit. Both where routers are installed. • SSH has been configured on the
switches are interconnected via a wrong line.
trunk link. Host A and host B are on 15. Refer to the exhibit. A new host • Telnet and SSH cannot be
the default VLAN but are not able to needs to be connected to VLAN 1. configured simultaneously.
exchange traffic. What should be Which IP addresses should be • #The transport input command is
done to fix the problem? assigned to this new host? configured incorrectly.
• Allow all VLANs on the trunk link. • 192.168.1.11 /28
• Remove the native VLAN from the • #192.168.1.22 /28 20. Refer to the exhibit. Which
trunk. • 192.168.1.33 /28 switch will be elected as the root
• Include a router or switch with • 192.168.1.44 /28 bridge of the spanning tree
Layer 3 capabilities. • 192.168.1.55 /28 topology?
• #Configure the same native VLAN • Cat-A
on both ends of the trunk. 16. Refer to the exhibit. How does • Cat-B
SW1 manage traffic coming from • #Cat-C
11. Refer to the exhibit. The hosts Host A? • Cat-D
connected to switch SW1 are not • SW1 drops the traffic because it is
able to communicate with the hosts untagged. 21. Refer to the exhibit. The
in the same VLANs connected to • #SW1 leaves the traffic untagged switches in the exhibit have VTP
switch SW2. What should be done and forwards it over the trunk. pruning enabled. Which VLANs will
to fix the problem? • SW1 tags the traffic with the be pruned from switch SW3?
• Configure VLANs with different lowest VLAN ID value and forwards • #VLAN 10 and VLAN 20
VLAN IDs on switch SW2. it over the trunk link. • VLAN 1, VLAN 10, and VLAN 20
• #Reconfigure the trunk port on • SW1 encapsulates the traffic with • VLAN 1, VLAN 1002 through 1005
switch SW2 with static trunk 802.1Q encapsulation and forwards • VLAN 1, VLAN 10, VLAN 20,
configuration. it over the trunk link. VLAN 1002 through 1005
• Introduce a Layer 3 device or a
switch with Layer 3 capability in the 17. Refer to the exhibit. The 22. Refer to the exhibit. What does
topology. switches are configured for VTP as STATIC indicate in the output that
• Apply IP addresses that are in the shown. Which two statements is shown?
same subnet to the interfaces used correctly describe the operation of • The switch will not allow any other
device to connect to port Fa0/15. "FORWARDING" mean in the • All the VLANs were pruned from
• #Traffic destined for MAC address command output shown? the trunk port between SW1 and
0000.c123.5432 will be forwarded • #The switch is sending and SW2.
to Fa0/15. receiving data frames. • SW1 and SW2 cannot be both set
• This entry will be removed and • The switch is receiving BPDUs, as VTP servers in the same VTP
refreshed every 300 seconds to but not sending data frames. domain.
keep it in the table. • The switch is participating in an • #VTP configuration revision
• The switch learned this MAC election process by forwarding the number of SW2 was higher than
address from the source address in BPDUs it receives. the configuration revision number of
a frame received on Fa0/15. • The switch is receiving BPDUs SW1.
• When processing a frame, the and populating the MAC address • The additional VLANs from SW2
switch does not have to perform a table, but not sending data. created more VLANs than the
lookup to determine the final VLAN database of SW1 could
destination port. 27. Refer to the exhibit. Switch contain.
SW2 has been newly purchased
23. Which three statements are and added to the network. What 31. Refer to the exhibit. A network
regarding router-on-a-stick inter- configuration should be applied to administrator needs to implement
VLAN routing? (Choose three.) SW2 so that it participates in the inter-VLAN routing on a hierarchical
•# requires the use of subinterfaces same VTP domain as switch SW1, network. On which devices should
on the router receives VLAN information from the inter-VLAN routing be
• requires an access link between SW1, and synchronizes VLAN configured?
the router and Layer 2 switch information? • AS1 and AS2
• #more cost-efficient and scalable • Disable VTP pruning on SW2. • DS1 and DS2
than using multiple physical • Configure SW2 in VTP • #Gateway and CS1
interfaces transparent mode. • Gateway, CS1, DS1, and DS2
• requires each subinterface to be • #Configure SW2 with the VTP
configured with the no shutdown domain password. 32. Which three statements are
command • Configure SW2 as a VTP server correct concerning the default
• #can impact performance if many with a higher revision number. configuration of a new switch?
VLANs compete for bandwidth on a (Choose three.)
single router interface 28. What are three benefits of a • Spanning Tree Protocol is
• makes troubleshooting the inter- hierarchical network model? disabled.
VLAN routing configuration much (Choose three.) • Enable password is configured as
less complex than when using • #reduced contention for cisco.
multiple physical interfaces bandwidth • #All switch ports are assigned to
• reduced size of the physical layout VLAN1.
24. Refer to the exhibit. Router RA • #increased fault tolerance of the • #The flash directory contains the
receives a packet with a source network IOS image.
address of 192.168.1.35 and a • elimination of the need for wiring • VLAN1 is configured with a
destination address of closets management IP address.
192.168.1.85. What will the router • elimination of the need for layer • #All interfaces are set to auto-
do with this packet? three functionality negotiation of speed and duplex.
• The router will forward the packet • #simplification of management
out interface FastEthernet 0/1.1. and troubleshooting 33. Refer to the exhibit. All hosts
• The router will forward the packet are in listen mode. Host 1 and Host
out interface FastEthernet 0/1.2. 29. Refer to the exhibit. Which 4 both transmit data at the same
• The router will forward the packet three options correctly identify time. How do the hosts respond on
out interface FastEthernet 0/1.3. information that could be the network? (Choose two.)
• The router will forward the packet associated with this • #After the end of the jam signal, a
out interface FastEthernet 0/1.2 output?(Choose three.) backoff algorithm is invoked.
and interface FastEthernet 0/1.3. • #Interface FastEthernet3/0/0 is • Hosts 1 and 4 are operating full
• #The router will ignore the packet subinterfaced. duplex so no collision will exist.
because the source and destination • #A non-proprietary trunking • The hub will block the port
are on the same broadcast domain. protocol is in use. connected to Host 4 to prevent a
• The router will drop the packet • #The configuration is appropriate collision.
since no network that includes the for a router-on-a-stick network • Hosts 1 and 4 are assigned
source address is attached to the design. shorter backoff values to provide
router. • A shutdown command has been them priority to access the media.
applied to interface • #If a host has data to transmit
25. Refer to the exhibit. The FastEthernet3/0/0. after the backoff period of that host,
network administrator needs to • Interface FastEthernet3/0/0.3 is the host checks to determine if the
remove the east-hosts VLAN and mapped to the default management line is idle before transmitting.
use the switch port from that VLAN VLAN.
in one of the existing VLANs. What • An IP address should be applied 34. Refer to the exhibit. After the
two commands should be used to FastEthernet3/0/0 for correct listed commands are entered into
when completely removing VLAN 2 data routing. router R1 and switch S1, the
from S1-Central while leaving the administrator enters the show
switch and all its interfaces 30. Refer to the exhibit. Switch interface fa0/1 trunk and gets the
operational? (Choose two.) SW2 was tested in a lab results shown. What is the likely
• S1-Central# reload environment and then inserted into problem?
• S1-Central# erase flash: a production network without • The trunk is established, but no
• #S1-Central(config)# no vlan 2 reloading its configuration. After the VLANs have been configured to
• S1-Central# delete flash:vlan.dat trunk link between SW1 and SW2 use it.
• #S1-Central(config-if)# switchport was brought up, all users lost • #The trunk has not been
access vlan 3 connectivity to the network. What established because the router
could be the source of the does not support dynamic trunking
26. Refer to the exhibit. What does problem? protocol.
• The router, the switch, or both command, enter the no service • #BPDUs may be discarded
must be configured with the password-encryption command. because of expiring timers.
dynamic desirable option for • The cabling distance between the
dynamic trunking protocol to 39. Refer to the exhibit. Which two switches is 100 meters.
establish a trunk. statements are regarding what the • The network diameter must be set
• The router is missing the dynamic cost value of 23 represents for to the number of meters of the
trunking protocol statements Switch4? (Choose two.) cable between the root bridge and
necessary to form a trunk. • #This cost represents the lowest its farthest connected switch.
cost path for Switch4 to the root
35. Refer to the exhibit. Which two switch. 44. Refer to the exhibit. A network
statements are about the operation • A cost of 23 is the value being administrator has segmented the
of the interfaces? (Choose two.) advertised out port 16 on the switch network into two VLANs and
• Incoming traffic with VLAN ID 0 is upstream (closer) to the root switch. configured Router1 for inter-VLAN
processed by interface fa0/0. • #Switch4 adds the cost of a Fast routing. A test of the network,
• #Incoming traffic that has a VLAN Ethernet link to 23 to determine its however, shows that hosts on each
ID of 2 is processed by subinterface total cost to reach the root switch. VLAN can only access local
fa0/0.2. • Switch4 is connected via a Fast resources and not resources on the
• Both subinterfaces remain up with Ethernet link to an upstream switch other VLAN. What is the most likely
line protocol up, even if fa0/0 line that in turn is directly connected to cause of this problem?
protocol is down. the root switch via a Gigabit • #Switch port Fa0/1 is not trunking.
• Subinterfaces use unique MAC Ethernet link. • Router interface Fa0/0 is possibly
addresses by adding the 802.1Q • The root switch is advertising a down.
VLAN ID to the hardware address. cost of 23, which is lower than any • No routing protocol is configured
• #Traffic inbound on this router is other switch in the VLAN0001 on Router1.
processed by different spanning-tree domain. • One of the router subinterfaces is
subinterfaces, depending on the possibly down.
VLAN from which the traffic 40. Refer to the exhibit. What three
originated. statements describe why Host1 and 45. What is the purpose of issuing
Host2 are unable to communicate? the command switchport mode
36. What three tasks should be (Choose three.) access on a switch interface?
performed before moving a Catalyst • #The switch ports are on different • disable port security
switch to another VTP management VLANs. • make the port operational
domain? (Choose three.) • The switch IP address is on the • override the default port behavior
• #Select the correct VTP mode and wrong subnet. • #force the port to be a part of a
version. • #The hosts are configured on single vlan
• #Configure the switch with the different logical networks.
name of the new management • #A router is required to forward 46. Refer to the exhibit. Which
domain. traffic between Host1 and Host2. statement is regarding the
• Download the VTP database from • The VLAN port assignments must information shown?
the VTP server in the new domain. be contiguous for each VLAN. • Only one VLAN is currently
• Configure the VTP server in the • The host default gateway configured to use the trunk links.
new domain to recognize the BID of addresses must be on the same • The switch negotiated trunk links
the switch. logical network. for interfaces Fa0/1 and Gi0/1.
• Reset the VTP counters to allow • A Cisco proprietary protocol is in
the switch to synchronize with the 41. Refer to the exhibit. Each use for interfaces Fa0/1 and Gi0/1.
other switches in the new domain. switch is shown with its MAC • #Interfaces Gi0/1 and Fa0/1 are
• #Verify that the switch has a lower address. Which switch will be allowed to carry data from multiple
configuration revision number than elected as the spanning-tree root VLANs
the other switches in the new bridge if the switches are
domain. configured with their default priority 47. Which identifier is used to keep
values? track of frames that are destined for
37. Refer to the exhibit. Hosts A • switch A a particular wireless client?
and B, connected to hub HB1, • switch B • AID
attempt to transmit a frame at the • switch C • SSID
same time but a collision occurs. • switch D • #BSSID
Which hosts will receive the • switch E • ESSID
collision jamming signal? • #switch F
• only hosts A and B 48. Refer to the exhibit. What will
• #only hosts A, B, and C 42. Refer to the exhibit. Hosts happen when frames that contain
• only hosts A, B, C, and D PC_A and PC_B send traffic an unknown source address reach
• only hosts A, B, C, and E simultaneously, and the frames interface fa0/24?
from the transmitting stations • A syslog message will be logged.
38. Which statement regarding the collide. What is the last device to • Fa0/24 will become error-
service password-encryption receive the collision? disabled.
command is ? • hub HB1 • #The incoming frames will be
• The service password-encryption • #switch SW1 dropped.
command is entered at the • router R1 • The security violation count will be
privileged EXEC mode prompt. • switch SW2 incremented.
• The service password-encryption • router R2
command encrypts only passwords • switch SW4 49. In which mode is a VTP switch
for the console and VTY ports. operating if it has been configured
• #The service password-encryption 43. Why is it important that the to only forward VTP
command encrypts all previously network administrator consider the advertisements?
unencrypted passwords in the spanning-tree network diameter • client
running configuration. when choosing the root bridge? • root
• To see the passwords encrypted • The network diameter limitation is • server
by the service password-encryption 9. • #transparent
50. Which method establishes an
administrative connection for
configuring the Linksys WRT300N
wireless access point?
• Associate with the access point
and then open a HyperTerminal
session with the access point.
• Physically connect to the access
point and then reboot the computer
to launch the configuration
software.
• #From a computer in the same IP
subnet as the access point, enter
the default IP address of the access
point in a web browser.
• Modify the TCP/IP properties of
the computer connected to the
access point so that it exists on the
same network, and then reboot
your computer to establish a
connection.

51. What two methods can be used


to remove MAC address table
entries from a switch? (Choose
two.)
• #Power cycle the switch to clear
all dynamically learned addresses
• The clear switching-tables
command will remove statically
configured entries.
• #The clear mac-address-table
command will remove statically and
dynamically configured table
entries.
• The erase flash command will
clear all statically configured table
entries.
• Statically configured MAC
addresses will automatically be
removed from the address table
300 minutes after the last activity
on a switch port.

52. What are two benefits of the


IEEE 802.11n standard over the
IEEE 802.11G? (Choose two.)
• requires less equipment
• #provides improved range
• #permits increased data rates
• has a single-input and a single-
output
• needs no hardware upgrade for
compatibility

Das könnte Ihnen auch gefallen